Gate Exam Numerical Ability Profit and Loss

The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are

Option
(A) TCP, UDP, UDP and TCP
(B) UDP, TCP, TCP and UDP
(C) UDP, TCP, UDP and TCP
(D) TCP, UDP, TCP and UDP

Read Solution (Total 1)

Gate Other Question

Assume that source S and destination D are connected through two intermediate routers labeled R. Determine how many times each packet has to visit the network layer and the data link layer during a transmission from S to D.

Option
(A) Network layer -4 times and Data link layer-4 times
(B) Network layer -4 times and Data link layer-3 times
(C) Network layer -4 times and Data link layer-6 times
(D) Network layer -2 times and Data link layer-6 times
Using public key cryptography, X adds a digital signature s to message M, encrypts , and sends it to Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?
(A) Encryption: X's private key followed by Y's private key; Decryption: X's public
key followed by Y's public key
(B) Encryption: X's private key followed by Y's public key; Decryption: X's public
key followed by Y's private key
(C) Encryption: X's public key followed by Y's private key; Decryption: Y's public
key followed by X's private key
(D) Encryption: X's private key followed by Y's public key; Decryption: Y's private
key followed by X's public key